Posted on 03/23/2019 3:31:13 PM PDT by DUMBGRUNT
Tesla is the first automaker to participate in a Pwn2Own hacking event, which is run by Trend Micros Zero Day Initiative (ZDI).
The event happened in Vancouver this week and a team of two hackers managed to find an exploit on the last day of competition.
Over the past 4 years, Tesla has been running a bug bounty program and according to sources familiar with the effort, the company has given away hundreds of thousands in rewards to hackers who exposed vulnerabilities in its system
(Excerpt) Read more at electrek.co ...
My 79 Ford FWD F-250 cant be hacked.
Define hacked?
I suspect, that a good shot of water on the distributor cap would shut it down?
How about a simple brute force attack?
A heavy cable choker and a VERY heavy vehicle to direct it as desired.
Anything to poke a small hole low in the radiator...
Neither humans or old Ma Bell phones can be hacked.
Every day we are bombarded with attempted hacks, many successful.
Proof: count the votes Hilary collected.
The old Ma Bell phones?
There are zillions of line powered devices that do whatever you like.
A favorite is to use them for an intercom, just add a battery, can be accomplished with just the handsets.
I stand corrected about the humans, Thought about that after I hit the reply button.
Yep, the old telephones were great, like you say they make nice intercoms. I used to use door bell transformers to power them up.
I have owned this truck since it was new and its been through the mill. At around 6000 lbs, Im not concerned about another vehicle taking it out. As far as a small hole in the radiator, it would probably run for another 30 miles before it quit. Its basically a bulletproof vehicle that would be difficult to kill. Besides that, I am in total control of it while driving.
It is great that you have kept it going all the years!
How many miles?
I had a ‘69 Volvo 164 bought it in ‘73, it had well over 100k. I rebuilt the engine and drove it for ten years and gave it to my brother with 225k. Volvo had a six digit odometer. Also, they are a galvanized body, so the road salt takes longer to eat them.
Now we only drive them about five years and give them to our kids.
Are you storing a select car or truck for the near future?
The Infiniti has been drive by wire for a few years now.
YES, STEERING TOO.
Not many use a throttle cable anymore.
Brake by wire is common.
There is a computer controlling everything.
And it is made by the low bidder!!!
I gave it a complete rebuild about 15 years ago. It had close to 300k miles at the time. I replaced the original 400M v-8 with a 460 out of a F-600. The engine rebuild and conversion cost around $3k at the time. The truck runs great, has all of the power you will ever need but gas mileage sucks, 10 mpg is a good day.
I am considering putting a Cat V-8 diesel in it.
My 1965 International Scout can’t be Hacked!!
Same as #41
Had a 1960(?) Travelall sold it to a friend.
He called to say a wheel cylinder was leaking badly and IH wanted crazy money for it???
I told him how to pinch the line off until he could find a deal.
About a year or so later he wrecked it.
He was down to ONE WHEEL BRAKE and it went out!!!
He hacked it himself.
More than I can say for my 2004. Bought it in 2012 and took it hunting. Had to be towed home the first six trips. 100 miles of towing each time.
You know... We once had self driving Ma Bell phones, and they still got wrong numbers once in awhile because there was no direct manual human input. They used to get hacked by nosy busy bodies too. These were phased out for phones with more privacy and direct manual human input. lol
(I didn’t Embed it because the image renders in here way too HUGE.)
Perhaps not, but the origins of hacking acually were those old Ma Bell phones. The phones themsevles weren’t hacked but they were the tool/vulnerability used to hack Ma Bell back itself.
And.now that I think about it humans are one of the most hackable things in existence. Most computer hacks are conducted through social engineering because a computer’s idiot owner is the most vulnerable link in the chain. Social engineering is also how Democrats and Republicans who turn RINO get elected so consistently... humans simply are much easier to trick than computers.
I stood corrected on that a few replies back. But those old party line phones did get hacked, they got hacked by nosy humans who would listen in on others phone calls. lol
The Mac was hacked in 8 minutes
The windows machine was hacked in by end of day
-The hacks are prepared as far out as a year in advance, and only the execution took place in 8 minutes. It may (or may not) have been much longer figuring out how to exploit the Mac, but faster to execute once the problem was solved.
-Apple’s past boastfulness has placed them as the premium/priority targets as these events.
-BSD Unix which is the basis for MacOS actually is a much more secure foundation than windows, but Windows has improved a lot over the years, and Apple has grown kind of lax about security over time. Apple is kind of like the fictionalized Maytag repairman character, he had to do so little for so many years, that he’d probably be useless when something actually breaks.
Acutally, I was thinking of phone phreaking where hackers would record (or even imitate) the tones the phones sent back to Bell to do things like things like score themselves free long distance or use pay phones for free.
I can’t even imagine what it was like to use a party line phone, I think I’d sooner go without phone at all rather than have my neighbors snooping on me, even though my personal life is pretty mundane.
Did you see this? This self driving phone was from before dialtones or even pulse. We had this one on the lobby desk in the shop for years just for those who came in and wanted to “borrow the phone for a minute” which always ended up being an hour. The looks on their faces were just priceless. lol
Oh we took care of the snoops on the party line. We would “set them up”. Like mention that someone’s house was on fire and then all be standing there laughing when the “snoop” showed up to see the fire that was not. lol
No one claimed the hackers were not experienced with the operating systems. I am just saying that security by obscurity isn’t really security.
MacOS, is UNIX. UNIX isn’t obscure. Heck, last time I looked Apple was the single top selling brand of computer. (Granted, most if the other brands ship with Windows and combined are a larger ecosystem than Mac OS.) Security by obscurity hasn’t properly applied to them since the days of OS 9 and definitely hasn’t applied to them after the Intel transition. Even if Mac OS was still obscure the people that own them are generally wealthy and, there’s a lot more to gain stealing from the rich than the poor.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.